| |
1-20.
1-21.
1-22.
1-23.
For handling and reporting
articles suspected of being a
mail bomb, you should refer to
what postal publication?
1 .
DOD Activity Address
Directory
2 .
DOD Postal Manual
3 .
DON Postal Instructions
4 .
USPS Domestic Mail Manual
Policies relating to security
of Department of the Navy
classified information is the
responsibility of what
official?
1 .
Chief of Naval Information
2 .
Chief of Naval Operations
3 .
Director of Naval
Intelligence
4 .
Secretary of the Navy
Classified information is
protected by which of the
following persons?
1 .
The classified material
officer only
2 .
The commanding officer or
officer in charge at each
military command only
3 .
The security manager only
4 .
Every individual having
access to classified
information
Procedures to be followed in
safeguarding classified
information are found in which
of the following publications?
1 .
USPSINST 5840.12
2 .
DOD Directive 5300.2
3 .
OPNAVINST 5510,1
4 .
SECNAVINST 5400.6
1-24.
Which of the following
descriptions best defines the
term access?
1 .
Being where classified
information is kept
2 .
The opportunity and
ability to obtain
knowledge of classified
information
3 .
The ability to obtain
classified documents
4 .
Taking possession of
classified information
1-25.
Which of the following items
are termed as classified
material?
1 .
Documents containing
classified information
2 .
Products in which
classified information is
recorded
3 .
Substances that are
classified
4 .
All of the above
1-26.
The release of classified
information to an unauthorized
person is best described by
which of the following terms?
1 .
Disclosure
2 .
Declassification
3 .
Compromise
4 .
Improper transmission
1-27.
To protect national security,
Navy information is classified
by category.
At present the
Navy security information
program consists of what type
of information categories?
1 .
Top Secret, Secret,
Confidential, and
Restricted Data
2 .
Top Secrett Secret,
Confidential, and For
Official Use Only
3 .
Top Secret, Secret, and
Confidential
4 .
Secret, Confidential, and
Restricted Data
3
|